ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html | Mailing List Third Party Advisory |
http://support.ntp.org/bin/view/Main/NtpBug3592 | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1716665 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202007-12 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200424-0002/ | Third Party Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
History
26 Apr 2022, 17:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
|
CWE | CWE-346 | |
References |
|
|
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-12 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html - Mailing List, Third Party Advisory |
Information
Published : 2020-04-17 04:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-11868
Mitre link : CVE-2020-11868
CVE.ORG link : CVE-2020-11868
JSON object : View
Products Affected
netapp
- clustered_data_ontap
- solidfire
- all_flash_fabric-attached_storage_a400
- virtual_storage_console
- all_flash_fabric-attached_storage_8300
- all_flash_fabric-attached_storage_8700_firmware
- data_ontap
- fabric-attached_storage_8300
- fabric-attached_storage_8700_firmware
- all_flash_fabric-attached_storage_8700
- fabric-attached_storage_a400
- fabric-attached_storage_8300_firmware
- hci_storage_node_firmware
- all_flash_fabric-attached_storage_a400_firmware
- all_flash_fabric-attached_storage_8300_firmware
- fabric-attached_storage_a400_firmware
- vasa_provider_for_clustered_data_ontap
- hci_storage_node
- hci_management_node
- fabric-attached_storage_8700
redhat
- enterprise_linux
debian
- debian_linux
ntp
- ntp
opensuse
- leap
CWE
CWE-346
Origin Validation Error